Search Results - jian+ren

6 Results Sort By:
Secure and Efficient Orthogonal Frequency Division Multiplexing Transmission System with Disguised Jamming
VALUE PROPOSITION The use of orthogonal frequency division multiplexing (OFDM) signal modulation has become widespread in current electronics. Currently 4G, 5G, LTE and other data and telecommunications systems utilize this modulation technique due to its numerous advantages.. With integration of OFDM into consumer, government, and corporate fields,...
Published: 8/16/2024   |   Inventor(s): Tongtong Li, Jian Ren, Yuan Liang
Keywords(s):  
Category(s): Computer Software, Telecommunications and Internet, Defense
Blockchain-based Mobile Electronic Voting
VALUE PROPOSITION Electronic voting presents a convenient and cost-effective alternative to current paper ballot-based voting. It provides many benefits such as increased voter turnout and accuracy in the decision-making process. While presenting many improvements, e-voting still faces serious security challenges that hinder its adoption, especially...
Published: 6/25/2024   |   Inventor(s): Jian Ren, Ehab Zaghloul, Tongtong Li
Keywords(s):  
Category(s): Computer Software, Informatics
Bi-Functional RGD Peptide and a Co-Signaling Mechanism to Promote Therapeutic Angiogenesis
Bi-Functional RGD Peptide to Promote Therapeutic Angiogenesis, Treat Ischemic Diseases Technology: While previous studies have focused on the identification of biological ligands to improve the functions of endothelial cells, MUSC and Clemson University researchers have combined modern bioinformatics and a newly established peptide functionalized...
Published: 3/23/2023   |   Inventor(s): Chung-Jen (James) Chou, Ying Mei, Jia Jia
Keywords(s):  
Category(s): BioPharma
Regenerating Code uses Rate-matching to Improve Retrieval from Hostile Networks
Executive SummaryA combination of two new regenerating algorithms increases the ability to recover information in a hostile network. This layered approach yields a more efficient and reliable way of detecting and correcting malicious nodes.Description of TechnologyIn a hostile network, conventional regeneration codes struggle to restore corrupt nodes...
Published: 6/8/2021   |   Inventor(s): Jian Ren, Jian Li, Tongtong Li
Keywords(s):  
Category(s): Computer Software, Communication
Cost-Aware Secure Outsourcing of General Computational Problems
Executive SummaryCloud computing provides end-users on demand access to a shared pool of computing resources, such as computational power and storage. It enables the end-users to utilize those resources in a pay-per-use manner instead of purchasing expensive equipment and maintaining an IT staff. The end-users outsource their computational tasks to...
Published: 6/8/2021   |   Inventor(s): Jian Ren, Kai Zhou
Keywords(s):  
Category(s): Computer Software, Data Processing/Analysis, Informatics, Telecommunications and Internet
Defense Against Primary User Emulation Attacks In Cognitive Radio Networks
Executive SummaryCognitive radio (CR) networks take advantage of unused bandwidth through which secondary unlicensed users may share the spectrum with the licensed primary users to better utilize the spectrum at any given time. Primary user emulation attacks (PUEAs) are malicious attacks in which a malicious user mimics the signal of a primary user...
Published: 6/8/2021   |   Inventor(s): Tongtong Li, Jian Ren, Mai Abdelhakim, Ahmed Alahmadi
Keywords(s):  
Category(s): Communication